Active Topics

 


Reply
Thread Tools
Posts: 673 | Thanked: 856 times | Joined on Mar 2006
#11
Originally Posted by javispedro View Post
Sadly, the problem with Aegis comes with its policy; currently, you are still to see <sarcasm> "the best of it" </sarcasm> : its current policy is rather allowing to applications from the unknown source (aka unsigned applications).

How this policy will be in later firmwares is something I don't know. The hints that are in the current firmware's restok.conf file do not look good, but for the time being, I am giving them the benefit of the doubt.
Is it possible to post restok.conf?

So far I've got the feeling that this would allow Nokia (or third party such as ISP) to deny access to certain applications at later time.

That would be so Apple-like.

Last edited by momcilo; 2011-09-13 at 13:34.
 

The Following User Says Thank You to momcilo For This Useful Post:
javispedro's Avatar
Posts: 2,355 | Thanked: 5,249 times | Joined on Jan 2009 @ Barcelona
#12
Originally Posted by momcilo View Post
Is it possible to post restok.conf?
Posting the full file is probably not Ok, but I posted the interesting fragment here

Originally Posted by momcilo View Post
So far I've got the feeling that this would allow Nokia (or third party such as ISP) to deny access to certain applications at later time.
That would only work if we were able to sign our own applications -- we are all assuming we are not going to (unless you planned to target Ovi). They do not have any way to identify an unsigned application exclusively, so they can't do that.

Therefore, the only source of nuisance for a free software developer is what is allowed for unsigned applications. So far, even disabling Aegis itself is allowed. But let's see what they have in store.

Last edited by javispedro; 2011-09-13 at 09:57.
 

The Following 2 Users Say Thank You to javispedro For This Useful Post:
Posts: 673 | Thanked: 856 times | Joined on Mar 2006
#13
Originally Posted by javispedro View Post
Posting the full file is probably not Ok, but I posted the interesting fragment here3


That would only work if we were able to sign our own applications -- we are all assuming we are not going to (unless you planned to target Ovi). They do not have any way to identify an unsigned application exclusively, so they can't do that.
If you refer to http://pastebin.com/KPX88Sgh, that is unavailable.
 

The Following User Says Thank You to momcilo For This Useful Post:
javispedro's Avatar
Posts: 2,355 | Thanked: 5,249 times | Joined on Jan 2009 @ Barcelona
#14
Originally Posted by momcilo View Post
If you refer to http://pastebin.com/KPX88Sgh, that is unavailable.
Aw, you'll have to wait until tonight then. But that's not that important, it's just a list of tokens and most probably you'll have no idea what they mean unless you're familiar with Harmattan.
 

The Following 2 Users Say Thank You to javispedro For This Useful Post:
Posts: 673 | Thanked: 856 times | Joined on Mar 2006
#15
Originally Posted by javispedro View Post
Aw, you'll have to wait until tonight then. But that's not that important, it's just a list of tokens and most probably you'll have no idea what they mean unless you're familiar with Harmattan.
The more I read about Harmattan and Mobile Simplified Security Framework, the less I like it.

So far I have confirmed that it is true TPM platform, and it seems to be similar to what Motorola did in past.
 

The Following User Says Thank You to momcilo For This Useful Post:
Posts: 673 | Thanked: 856 times | Joined on Mar 2006
#16
I've found the most comprehensive overview of goals and security features of MSSF at:

Mobile Simplified Security Framework MSSFv2, by Dmitry Kasatkin, MeeGo Computers, Nokia, at MeeGo Conf, Moscow, Russia, 11.03.2011


Security goals:

Protection of the user
1.1 Disallow loss/stealing of owner's personal data
• E.g mallware sending user's contacts
1.2. Miss-use of the device (unexpected costs)
• E.g mallware sending sms to pay numbers
Protection of the Device
2.1 Must meet regulatory requirements and specification
• Identity protection
2.2 Disallow changing of RF, EM or WiFi tuning values

Protection of the Business
3.1 Disallow braking of the SIM/Subsidy Lock
• Lose of business
3.2 Limit what can be installed on the device
• AT&T variant needs to stay AT&T variant
3.4 To reduce fraud against Business
• False service bills, Device cloning, back-door manufacturing
Enable new services
4.1 Allow services such as Music store or App Store and support copy protection
• Mobile payments and Billing
 

The Following 13 Users Say Thank You to momcilo For This Useful Post:
debernardis's Avatar
Posts: 2,142 | Thanked: 2,054 times | Joined on Dec 2006 @ Sicily
#17
Thank you very much but I don't want this sort of thing.
__________________
Ernesto de Bernardis

 

The Following 7 Users Say Thank You to debernardis For This Useful Post:
danramos's Avatar
Posts: 4,672 | Thanked: 5,455 times | Joined on Jul 2008 @ Springfield, MA, USA
#18
TC is controversial because it is technically possible not just to secure the hardware for its owner, but also to secure against its owner. Such controversy has led opponents of trusted computing, such as Richard Stallman, to refer to it instead as treacherous computing, and some academic opponents have begun to place quotation marks around "trusted computing" in scholarly texts.[2][3]

The trusted computing platform need not be used to secure the system against the owner. It is possible to leave to the owner rights of authorization and have no centralized authority. It is also possible to build open source stack of trusted modules, leaving for the security chip only the task to guard against unauthorized modifications. Open source Linux drivers exist [4] to access and use the trusted computing chip. However, uncooperative operating systems can misuse security features to prevent legitimate data exchange.

Source: http://en.wikipedia.org/wiki/Trusted_Computing
__________________
Nokia's slogan shouldn't be the pedo-palmgrabbing image with the slogan, "Connecting People"... It should be one hand open pleadingly with another hand giving the middle finger and the more apt slogan, "Potential Unrealized." --DR
 

The Following 4 Users Say Thank You to danramos For This Useful Post:
smegheadz's Avatar
Posts: 387 | Thanked: 566 times | Joined on Dec 2009 @ Dublin
#19
Seems like it's more like the current mobile OS's out there. The price to pay for the Service providers to accept it considering how the n900 was easily unlocked from restrictions for example by vodafone. Will wait and see how this develops.
__________________
Never argue with stupid people.They lower you to their level then beat you with experience.
Humility is something we should all taste.
 

The Following User Says Thank You to smegheadz For This Useful Post:
Posts: 673 | Thanked: 856 times | Joined on Mar 2006
#20
Originally Posted by smegheadz View Post
Seems like it's more like the current mobile OS's out there. The price to pay for the Service providers to accept it considering how the n900 was easily unlocked from restrictions for example by vodafone. Will wait and see how this develops.
Based on this diagram it looks like the Service provider can completely disable Open Mode (developer mode, which is restricted btw). I think people should be aware of this before buying this phone.


Last edited by momcilo; 2011-09-14 at 14:23.
 

The Following 11 Users Say Thank You to momcilo For This Useful Post:
Reply

Tags
locked boot, neutered, trecherous


 
Forum Jump


All times are GMT. The time now is 10:21.